Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Customer Success: Using Log Data to Respond to Security Incidents

DZone's Guide to

Customer Success: Using Log Data to Respond to Security Incidents

· Performance Zone
Free Resource

Download our Introduction to API Performance Testing and learn why testing your API is just as important as testing your website, and how to start today.

One of the more unique customer use cases we’ve seen recently is allowing the security incident response team to use log data to track malicious attempts against their network.  It is well established that Logentries can maintain log data across all of your systems – but adding just a few more pieces of information can result in deep insights into your security measures and their effectiveness.Logs as Data for Security

So how do you do this today? Most current generation firewalls and routers support syslog capabilities and can be sent to Logentries for analysis.  By adding in logs from Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) and vulnerability scanners, you can achieve a complete “beginning to end” view of an access attempt.

With the new grouping feature, you can easily group your edge router, firewall, internal routers, IDS/IPS, vulnerability scanner, and access, system, and error logs from the physical machines into one centralized location.  With just a few clicks you can easily be set-up to monitor these security logs in real-time and to trace a connection through your entire network to determine which security measures succeeded or failed. This gives you immediate visibility into if — and how – the network was exploited.

Have questions? Feel free to email me directly at tom.smit@Logentries.com, or contact our Support team at support@logentries.com!Using Logentries to identify security issues

Find scaling and performance issues before your customers do with our Introduction to High-Capacity Load Testing guide.

Topics:

Published at DZone with permission of Trevor Parsons, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

THE DZONE NEWSLETTER

Dev Resources & Solutions Straight to Your Inbox

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

X

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}